From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-it0-f70.google.com (mail-it0-f70.google.com [209.85.214.70]) by kanga.kvack.org (Postfix) with ESMTP id C4FD76B0003 for ; Tue, 31 Jul 2018 13:32:52 -0400 (EDT) Received: by mail-it0-f70.google.com with SMTP id 136-v6so3414604itw.5 for ; Tue, 31 Jul 2018 10:32:52 -0700 (PDT) Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id u62-v6sor1145150itb.33.2018.07.31.10.32.51 for (Google Transport Security); Tue, 31 Jul 2018 10:32:51 -0700 (PDT) MIME-Version: 1.0 References: <20180731170957.o4vhopmzgedpo5sh@breakpoint.cc> In-Reply-To: <20180731170957.o4vhopmzgedpo5sh@breakpoint.cc> From: Eric Dumazet Date: Tue, 31 Jul 2018 10:32:39 -0700 Message-ID: Subject: Re: SLAB_TYPESAFE_BY_RCU without constructors (was Re: [PATCH v4 13/17] khwasan: add hooks implementation) Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Florian Westphal Cc: Andrey Ryabinin , Theodore Ts'o , jack@suse.com, linux-ext4@vger.kernel.org, Greg Kroah-Hartman , Pablo Neira Ayuso , Jozsef Kadlecsik , David Miller , netfilter-devel@vger.kernel.org, coreteam@netfilter.org, netdev , Gerrit Renker , dccp@vger.kernel.org, jani.nikula@linux.intel.com, joonas.lahtinen@linux.intel.com, rodrigo.vivi@intel.com, airlied@linux.ie, intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, Alexey Kuznetsov , Hideaki YOSHIFUJI , Ursula Braun , linux-s390@vger.kernel.org, LKML , Dmitry Vyukov , Christoph Lameter , Andrew Morton , linux-mm , Andrey Konovalov , Linus Torvalds On Tue, Jul 31, 2018 at 10:10 AM Florian Westphal wrote: > > Andrey Ryabinin wrote: > > Guys, it seems that we have a lot of code using SLAB_TYPESAFE_BY_RCU cache without constructor. > > I think it's nearly impossible to use that combination without having bugs. > > It's either you don't really need the SLAB_TYPESAFE_BY_RCU, or you need to have a constructor in kmem_cache. > > > > Could you guys, please, verify your code if it's really need SLAB_TYPSAFE or constructor? > > > > E.g. the netlink code look extremely suspicious: > > > > /* > > * Do not use kmem_cache_zalloc(), as this cache uses > > * SLAB_TYPESAFE_BY_RCU. > > */ > > ct = kmem_cache_alloc(nf_conntrack_cachep, gfp); > > if (ct == NULL) > > goto out; > > > > spin_lock_init(&ct->lock); > > > > If nf_conntrack_cachep objects really used in rcu typesafe manner, than 'ct' returned by kmem_cache_alloc might still be > > in use by another cpu. So we just reinitialize spin_lock used by someone else? > > That would be a bug, nf_conn objects are reference counted. > > spinlock can only be used after object had its refcount incremented. > > lookup operation on nf_conn object: > 1. compare keys > 2. attempt to obtain refcount (using _not_zero version) > 3. compare keys again after refcount was obtained > > if any of that fails, nf_conn candidate is skipped. Yes, the key here is the refcount, this is only what we need to clear after kmem_cache_alloc() By definition, if an object is being freed/reallocated, the refcount should be already 0, and clearing it again is a NOP.